Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache Hadoop distributions.

In addition, the new File Protector Gateway Server provides another powerful yet flexible option for fine-grain data protection of sensitive data before it enters Hadoop or other data stores.

"Release 6.5 demonstrates Protegrity’s continued focus on centralized security management, and innovation in supporting enterprise-wide data protection. With advanced appliance clustering and infinitely scalable on-node protection capabilities to support parallel, distributed computing environments such as Hadoop and Teradata, the feature-rich flexibility of the Protegrity Data Security Platform allows companies to easily expand and control security throughout their enterprises,” said Yigal Rozenberg, Protegrity VP Products.

The Protegrity Big Data Protector has been certified to support even more distributions of Apache Hadoop, including IBM Big Insights, Pivotal, Hortonworks, Cloudera, and MapR. Utilizing strong encryption for coarse-grain file or volume protection, patent-pending Vaultless Tokenization on the node for fine-grain field level protection, and central policy control for access management, the Protegrity Big Data Protector secures all sensitive data in Hadoop from external and internal threats.

Users and business processes can continue to analyze the secure data for transformative decision-making insights, and as part of the Protegrity Data Security Platform, data is secured from the point of acquisition to deletion, across the heterogeneous enterprise.

The File Protector Gateway Server (FPGS) functions as a protected zone outside of Hadoop, or other data systems. It allows sensitive data elements in structured data files to be parsed and protected or un-protected using Protegrity Vaultless Tokenization, masking, or encryption before entering or leaving data systems. The FPGS uses a protection policy to determine the data elements to be protected/un-protected and the protection method to be used. After protecting/un-protecting data elements, the file can be moved elsewhere, to another machine, platform, or outside the enterprise, or remain in the FPGS in secure storage.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.